최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0272911 (2002-10-18) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 80 인용 특허 : 412 |
Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The match
Rights management information is used at least in part in a matching, narrowcasting, classifying and/or selecting process. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting. The matching and classification utility system may match, narrowcast, classify and/or select people and/or things, non-limiting examples of which include software objects. The Matching and Classification Utility system may use any pre-existing classification schemes, including at least some rights management information and/or other qualitative and/or parameter data indicating and/or defining classes, classification systems, class hierarchies, category schemes, class assignments, category assignments, and/or class membership. The Matching and Classification Utility may also use at least some rights management information together with any artificial intelligence, expert system, statistical, computational, manual, or any other means to define new classes, class hierarchies, classification systems, category schemes, and/or assign persons, things, and/or groups of persons and/or things to at least one class.
We claim: 1. A method including the steps of: generating a first content object; packaging the first content object with metadata and a first rule; communicating the first content object to a matching and classification utility; at the matching and classification utility, using the metadata to assi
We claim: 1. A method including the steps of: generating a first content object; packaging the first content object with metadata and a first rule; communicating the first content object to a matching and classification utility; at the matching and classification utility, using the metadata to assign the content object to a content class; packaging the first content object in a secure container having associated the first rule, and a second rule added at the matching and classification utility; communicating the secure container to a user chosen based at least in part on a match between the content class and a user class to which the user had been assigned; at the user's site, the user complying with the first rule or the second rule and, based on the compliance, opening the secure container to retrieve at least a portion of the first content object; and at the user's site, the user using at least a portion of the first content object, the use at least in part controlled by the first rule or the second rule. 2. A method as in claim 1, further including: before the step of communicating the secure container to the user, the matching and classification utility receiving demographic information from the user and, based at least in part on the demographic information, the matching and classification utility assigning the user to the user class. 3. A method as in claim 2, further including: before the matching and classification utility receives demographic information from the user, the user packaging the demographic information in a secure container and associating a rule with the secure container, the rule at least in part governing use of at least a portion of the secure container contents, the demographic information being received by the matching and classification utility in the secure container and the matching and classification utility complying with the rule in making a use of at least a portion of the demographic information. 4. A method as in claim 1, further including: before the step of communicating the secure container to the user, the matching and classification utility receiving usage information from a usage clearinghouse, the usage information relating to the user and, based at least in part on the usage information, the matching and classification utility assigning the user to the user class. 5. A method as in claim 4, in which: the usage information includes information relating to the user's usage of a second content object, the second content object being a member of the content class. 6. A method as in claim 1, in which the first rule relates, at least in part, to a requirement that payment be made for at least one aspect of use of the content object. 7. A method as in claim 1, further including the step of: receiving a request from the user's site for a content object assigned to the content class. 8. A method as in claim 7, further including: receiving a digital certificate relating, at least in part, to one or more characteristics of the user's site or the user. 9. A method as in claim 8, further including: evaluating the digital certificate, and determining whether to communicate the content object to the user based at least in part on a result of the evaluation. 10. A method as in claim 8, further including: comparing information conveyed by the digital certificate with one or more requirements specified by the first rule, and determining whether to communicate the content object to the user, the determination being based at least in part on whether the information conveyed by the digital certificate satisfies the one or more requirements specified by the first rule. 11. A method as in claim 8, in which the content object comprises, at least in part, software. 12. A method as in claim 8, in which the digital certificate provides, at least in part, information regarding the trustworthiness of the user's site or the user. 13. A method as in claim 1, further comprising: communicating the second rule to the user's site; wherein the second rule is used, at least in part, to govern at least one aspect of use of the content object at the user's site. 14. A method as in claim 1, in which the content object and the second rule are communicated to the user's site independently. 15. The method of claim 1 further including the step of: receiving a request for a content object of a specified class, the request indicating one or more desired characteristics of control information associated with the content object, the request also including information about the user's site or the user. 16. A method as in claim 15, in which the information about the user's site or the user includes a digital certificate relating, at least in part, to one or more characteristics of the user's site or the use. 17. A method as in claim 15, in which the content object comprises software, and in which the at least one use comprises executing the software. 18. A method as in claim 16, in which the digital certificate includes information relating to the trustworthiness of the user's site or the user. 19. A method as in claim 1, in which the content object comprises, at least in part, software. 20. A method as in claim 1, further including receiving a digital certificate relating, at least in part, to one or more characteristics of the user's site or the user. 21. A method as in claim 20, in which the digital certificate provides, at least in part, information regarding the trustworthiness of the user's site or the user. 22. A method as in claim 20, further including comparing information conveyed by the digital certificate with one or more requirements specified by the first rule. 23. A method as in claim 22, further including determining whether to communicate the content object to the user, the determination being based at least in part on whether the information conveyed by the digital certificate satisfies the one or more requirements specified by the first rule. 24. A method as in claim 20, in which the content object comprises, at least in part, software. 25. A method as in claim 1 wherein choosing the user, to which the secure container is communicated, includes identifying the user's site that wishes to obtain a content object assigned to the content class. 26. A method as in claim 25, in which identifying a remote site includes receiving a request from the user's site for a content object assigned to the content class.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.